diff options
author | tb <> | 2020-09-10 08:24:31 +0000 |
---|---|---|
committer | tb <> | 2020-09-10 08:24:31 +0000 |
commit | 03afcb27b2145b6911d29411c8a1764427f42416 (patch) | |
tree | b3e0aa6cf6eddd94df89dfac0e12eb1b04734ad0 /src/regress/lib | |
parent | af9af96feaaefaf84c9b8e8f3d8a7e9a3a8f3d2b (diff) | |
download | openbsd-03afcb27b2145b6911d29411c8a1764427f42416.tar.gz openbsd-03afcb27b2145b6911d29411c8a1764427f42416.tar.bz2 openbsd-03afcb27b2145b6911d29411c8a1764427f42416.zip |
Enable test-tls13-large-number-of-extensions.py
Skip sending an empty ECPF extension for now: we don't accept it since
according to RFC 4492 and 8422 it needs to advertise uncompressed point
formats.
Diffstat (limited to 'src/regress/lib')
-rw-r--r-- | src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py | 9 |
1 files changed, 7 insertions, 2 deletions
diff --git a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py index 64300e8151..53629598ad 100644 --- a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py +++ b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py | |||
@@ -1,4 +1,4 @@ | |||
1 | # $OpenBSD: tlsfuzzer.py,v 1.16 2020/08/17 08:19:20 tb Exp $ | 1 | # $OpenBSD: tlsfuzzer.py,v 1.17 2020/09/10 08:24:31 tb Exp $ |
2 | # | 2 | # |
3 | # Copyright (c) 2020 Theo Buehler <tb@openbsd.org> | 3 | # Copyright (c) 2020 Theo Buehler <tb@openbsd.org> |
4 | # | 4 | # |
@@ -107,6 +107,12 @@ tls13_slow_tests = TestGroup("slow TLSv1.3 tests", [ | |||
107 | "-x", "max size payload (2**14) of Finished msg, with 16348 bytes of left padding, cipher TLS_AES_128_GCM_SHA256", | 107 | "-x", "max size payload (2**14) of Finished msg, with 16348 bytes of left padding, cipher TLS_AES_128_GCM_SHA256", |
108 | "-x", "max size payload (2**14) of Finished msg, with 16348 bytes of left padding, cipher TLS_CHACHA20_POLY1305_SHA256", | 108 | "-x", "max size payload (2**14) of Finished msg, with 16348 bytes of left padding, cipher TLS_CHACHA20_POLY1305_SHA256", |
109 | ]), | 109 | ]), |
110 | # We don't accept an empty ECPF extension since it must advertise the | ||
111 | # uncompressed point format. Exclude this extension type from the test. | ||
112 | Test( | ||
113 | "test-tls13-large-number-of-extensions.py", | ||
114 | tls13_args = ["--exc", "11"], | ||
115 | ), | ||
110 | ]) | 116 | ]) |
111 | 117 | ||
112 | tls13_extra_cert_tests = TestGroup("TLSv1.3 certificate tests", [ | 118 | tls13_extra_cert_tests = TestGroup("TLSv1.3 certificate tests", [ |
@@ -163,7 +169,6 @@ tls13_slow_failing_tests = TestGroup("slow, failing TLSv1.3 tests", [ | |||
163 | # The following two tests fail Test (skip empty extensions for the first one): | 169 | # The following two tests fail Test (skip empty extensions for the first one): |
164 | # 'empty unassigned extensions, ids in range from 2 to 4118' | 170 | # 'empty unassigned extensions, ids in range from 2 to 4118' |
165 | # 'unassigned extensions with random payload, ids in range from 2 to 1046' | 171 | # 'unassigned extensions with random payload, ids in range from 2 to 1046' |
166 | Test("test-tls13-large-number-of-extensions.py"), # 2 fail: empty/random payload | ||
167 | 172 | ||
168 | # 6 tests fail: 'rsa_pkcs1_{md5,sha{1,224,256,384,512}} signature' | 173 | # 6 tests fail: 'rsa_pkcs1_{md5,sha{1,224,256,384,512}} signature' |
169 | # We send server hello, but the test expects handshake_failure | 174 | # We send server hello, but the test expects handshake_failure |